Author: Andy Norton

At its most basic level, cyber resilience can be described as not ending up in the media as a victim of some sort of cyberattack or breach.
Cyber resilience means not losing operational capability in its varying forms, ranging from a cash shortage due to a...

For over a year now Lastline has witnessed a tremendous increase in malware designed for criminal cryptocurrency mining, or “cryptomining.” Of course, we all know that Bitcoin has been the go-to cryptocurrency for criminal payments in ransomware, but now on the back of Bitcoin’s successful...

As the value of cryptocurrency continues to rise, a new form of malware has grown in popularity: crypto-malware. Though "crypto" may seem like a buzzword that's popping up everywhere, it is very real when it comes to cyber threats. Crypto-malware is one of the latest...

The Worldwide Threat Assessment of the US Intelligence Community is a report produced by the Office of the Director of National Intelligence (DNI). Based on the intelligence received by the DNI from various intelligence agencies in the United States, the report covers a wide range...

The accelerating migration to the cloud is creating an attractive target for cybercriminals. One of the primary offerings is Microsoft Office 365, so we decided to take a closer look. We have provided a brief history of Office 365 attacks, and then we take a...

Last week was arguably the most important European security conference of the year, InfoSecurity Europe in London. As with all such events, there are particular themes that emerge, capturing the issues and the mood at the time of the event.
This year there was a higher...

Recently, the ASERT team at Arbor Networks, published a report on an old version of the Absolute Software product, Absolute LoJack for laptops, being illicitly modified by suspected APT28 actors. The LoJack implant, previously known as Computrace and brought into the spotlight in 2014 at...

In April we launched the first of our Malscape Monitor reports, for the fourth quarter of 2017. The report analyzes data from our Global Threat Intelligence Network (GTIN) to provide several insights and benchmarks on encounter rates with malware that CISOs can use to measure their own...